f:\CB\ARM_Sustaining\BuildResults\bin\Win32\Release\armsvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cf12ae5165b66142d2ab4441882419ac41105279b65f118a0ae90e7c50952eb9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf12ae5165b66142d2ab4441882419ac41105279b65f118a0ae90e7c50952eb9.exe
Resource
win10v2004-20241007-en
General
-
Target
cf12ae5165b66142d2ab4441882419ac41105279b65f118a0ae90e7c50952eb9
-
Size
3.4MB
-
MD5
4043c9a381ab161327917d9de860132f
-
SHA1
166f9575faa8184a1b41400a2bd4d867f714999d
-
SHA256
cf12ae5165b66142d2ab4441882419ac41105279b65f118a0ae90e7c50952eb9
-
SHA512
2da77546b36e48edcc8f0d868caee5cb2a22baca9b51ee2a782f7cf45058adc6d8ffd879fe354e7afff04a6b6edd8216a997282e75d17bd01d65584b585c6e50
-
SSDEEP
49152:UkuvxPljo+V8tgJd8/wnNTBkbtL2tLJu5HOTTlYvoGxUSJpX/hKPgssSt2gB:F0S+CgaIwV2VEHYsRX/hv7StX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf12ae5165b66142d2ab4441882419ac41105279b65f118a0ae90e7c50952eb9
Files
-
cf12ae5165b66142d2ab4441882419ac41105279b65f118a0ae90e7c50952eb9.exe windows:5 windows x86 arch:x86
0513dfa284a52b83da1d3297ed8702dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnmapViewOfFile
FormatMessageW
GetLocalTime
CreateFileMappingW
OpenFileMappingW
GetVolumeInformationW
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
MapViewOfFile
LocalFree
CloseHandle
GetCurrentThreadId
DeleteCriticalSection
lstrcmpiW
LocalAlloc
FindClose
GetProcAddress
GetLastError
RaiseException
lstrlenW
MultiByteToWideChar
lstrcmpW
GetModuleFileNameW
GetFileAttributesW
SizeofResource
InitializeCriticalSection
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
TerminateProcess
GetStartupInfoW
GetSystemTimeAsFileTime
Sleep
InterlockedExchange
GetCurrentProcessId
lstrcmpA
FindFirstFileW
FindResourceW
FreeLibrary
LoadResource
InterlockedCompareExchange
user32
DispatchMessageW
PostThreadMessageW
LoadStringW
CharNextW
GetMessageW
advapi32
OpenSCManagerW
RegisterEventSourceW
CloseServiceHandle
DeleteService
StartServiceCtrlDispatcherW
OpenServiceW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
ControlService
ReportEventW
RegisterServiceCtrlHandlerW
RegOpenKeyExW
SetServiceStatus
RegDeleteValueW
RegDeleteKeyW
DeregisterEventSource
CreateServiceW
shell32
ShellExecuteExW
SHGetFolderPathW
ole32
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoTaskMemRealloc
CoRegisterClassObject
StringFromGUID2
CoInitialize
oleaut32
SysFreeString
RegisterTypeLi
VarUI4FromStr
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
crypt32
CryptDecodeObject
CryptQueryObject
CertGetNameStringW
CertFreeCertificateContext
CertFindCertificateInStore
CertCloseStore
CryptMsgGetParam
CryptMsgClose
wintrust
WinVerifyTrust
msvcr90
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_CxxThrowException
__CxxFrameHandler3
_adjust_fdiv
__set_app_type
__p__fmode
??3@YAXPAX@Z
wcsncpy_s
??_U@YAPAXI@Z
memcmp
free
malloc
vswprintf_s
wcslen
wcsstr
_recalloc
memset
??_V@YAXPAX@Z
memcpy_s
_putws
wcscat_s
wcscpy_s
swprintf_s
_itow_s
_time64
?terminate@@YAXXZ
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__wgetmainargs
_cexit
_exit
__p__commode
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ